fkie_cve-2012-1151
Vulnerability from fkie_nvd
Published
2012-09-09 21:55
Modified
2024-11-21 01:36
Severity ?
Summary
Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:perl:perl:*:*:*:*:*:*:*:*", "matchCriteriaId": "736230E6-7071-4650-8FB0-DD5624C9172C", "versionEndIncluding": "2.18.1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.1:*:*:*:*:*:*:*", "matchCriteriaId": "E1EF38B8-36B2-4F21-8F41-D0CDE28CDE43", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.2:*:*:*:*:*:*:*", "matchCriteriaId": "CE4F0BB5-7DB7-4CC6-83C5-D8C84DC2A863", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.3:*:*:*:*:*:*:*", "matchCriteriaId": "FEC53956-98C5-4355-8670-9BB4A479BCC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.4:*:*:*:*:*:*:*", "matchCriteriaId": "7FB8269B-270B-455F-94B1-0F1025041EE1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.5:*:*:*:*:*:*:*", "matchCriteriaId": "B3460B9A-89F5-4F3C-80DB-0DE6099D64E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.52:*:*:*:*:*:*:*", "matchCriteriaId": "40C34F0C-B9A4-4AB4-8B34-44A65103DBBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.61:*:*:*:*:*:*:*", "matchCriteriaId": "65434B07-D9FB-4D3A-B63C-48DA7ED603EB", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.62:*:*:*:*:*:*:*", "matchCriteriaId": "0C634C91-BFD6-480A-ABC9-557066A11E1B", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.63:*:*:*:*:*:*:*", "matchCriteriaId": "C92F2903-486A-4656-8E43-AF6D9E475A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.64:*:*:*:*:*:*:*", "matchCriteriaId": "47C86A61-CBDF-40A1-AC66-AB452C1C4FBA", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.65:*:*:*:*:*:*:*", "matchCriteriaId": "519DD527-BFE9-4166-A391-127FB8EDFA81", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.66:*:*:*:*:*:*:*", "matchCriteriaId": "66842472-632B-4505-B3E0-32C59AA73AA6", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.67:*:*:*:*:*:*:*", "matchCriteriaId": "34774222-0D33-41F0-A917-09B044A53800", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.68:*:*:*:*:*:*:*", "matchCriteriaId": "1E4C35D3-8169-41AA-8719-5E2D32DEF265", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.69:*:*:*:*:*:*:*", "matchCriteriaId": "2880F00C-B64E-4B69-9FFD-FFAF00E0EA31", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.70:*:*:*:*:*:*:*", "matchCriteriaId": "978875E8-61E6-43C8-8E1B-BAA9BFE696E5", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.71:*:*:*:*:*:*:*", "matchCriteriaId": "45A9FB3A-ABF7-44E5-B3F3-C24E3FC2E440", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.72:*:*:*:*:*:*:*", "matchCriteriaId": "2E2B3B94-DA75-44A8-B13B-004989615B4F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.73:*:*:*:*:*:*:*", "matchCriteriaId": "E758B292-C06F-4AF7-99B9-2BC49533C25A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.80:*:*:*:*:*:*:*", "matchCriteriaId": "49F89A9B-4EAA-41A0-AEB6-16B7A7C13127", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.81:*:*:*:*:*:*:*", "matchCriteriaId": "110AB146-D842-49AE-A6FB-15574D94F556", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.82:*:*:*:*:*:*:*", "matchCriteriaId": "187FE6D6-7785-45C3-9FAF-C55AC370FD7E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.83:*:*:*:*:*:*:*", "matchCriteriaId": "F05B9866-08CD-4A32-8B59-4AA3818B2B5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.84:*:*:*:*:*:*:*", "matchCriteriaId": "C662A095-27AD-41B1-B92C-3352A68001DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.85:*:*:*:*:*:*:*", "matchCriteriaId": "890F038F-7668-4D67-8787-385145DE7F0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.86:*:*:*:*:*:*:*", "matchCriteriaId": "27C2A9DD-5A7D-489F-B2B2-BA2DD1FE5385", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.87:*:*:*:*:*:*:*", "matchCriteriaId": "98419B2D-7EF8-4F16-A95D-93D4C097F10A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.88:*:*:*:*:*:*:*", "matchCriteriaId": "F071074B-25A2-4ADA-AA51-DD5E07E44EE6", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.89:*:*:*:*:*:*:*", "matchCriteriaId": "3795B65D-4B65-419E-8ADC-8806BE12E0F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.90:*:*:*:*:*:*:*", "matchCriteriaId": "17578EF4-677D-4C0D-AE02-0B59EDF19CE3", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.91:*:*:*:*:*:*:*", "matchCriteriaId": "93DEF1EF-0286-4603-B9D8-05908189184A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.92:*:*:*:*:*:*:*", "matchCriteriaId": "6A170ED4-8B94-4C09-A5D5-B6A9A5D04AF0", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.93:*:*:*:*:*:*:*", "matchCriteriaId": "0990BD24-ED47-44EF-962D-4737DD295D5A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.94:*:*:*:*:*:*:*", "matchCriteriaId": "E2B0D454-CD0E-4BF1-A516-A4A5E19A447D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.95:*:*:*:*:*:*:*", "matchCriteriaId": "6D12BD17-3FBE-4917-9D44-4135FC857CBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.96:*:*:*:*:*:*:*", "matchCriteriaId": "AF110E96-77E7-4BF9-9309-606E02871360", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.97:*:*:*:*:*:*:*", "matchCriteriaId": "1C44DEA9-D1CC-4D6F-BFB4-F20BA8CBD837", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.98:*:*:*:*:*:*:*", "matchCriteriaId": "00ABCC48-9B7E-4312-8B64-44399409EDE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:0.99:*:*:*:*:*:*:*", "matchCriteriaId": "CB8D8793-F072-4C7A-84B5-79EB6D0541BC", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.00:*:*:*:*:*:*:*", "matchCriteriaId": "2DA44592-DC6D-4FB7-AC1D-A300643922C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.01:*:*:*:*:*:*:*", "matchCriteriaId": "5EBE0151-85BA-449C-880F-E23D8C446D8D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.20:*:*:*:*:*:*:*", "matchCriteriaId": "83F3ED90-9586-41DB-9B83-C6B05C605213", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.21:*:*:*:*:*:*:*", "matchCriteriaId": "0DB562AC-B665-4F2B-B004-9E848ACC7C20", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.22:*:*:*:*:*:*:*", "matchCriteriaId": "8305CB5A-A64A-4F11-B912-B2E428513E22", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.31:*:*:*:*:*:*:*", "matchCriteriaId": "367FF98C-12FF-4CEC-9870-6356FAD3C523", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.32:*:*:*:*:*:*:*", "matchCriteriaId": "191EDFB5-F9AB-4A8B-BFC7-9BB7BCE7AAFC", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.40:*:*:*:*:*:*:*", "matchCriteriaId": "A253AEB7-A581-4E1F-9410-E056390C0BC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.41:*:*:*:*:*:*:*", "matchCriteriaId": "2696ACCA-47FC-4D25-8A08-17F7CD640040", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.42:*:*:*:*:*:*:*", "matchCriteriaId": "50F9F981-903A-48F8-ACD9-48308E639261", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.43:*:*:*:*:*:*:*", "matchCriteriaId": "99E7410D-A498-49FB-818E-309BDBDB7A21", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.44:*:*:*:*:*:*:*", "matchCriteriaId": "85BE0085-3E86-4A39-8AE4-76ED06D2534B", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.45:*:*:*:*:*:*:*", "matchCriteriaId": "2614B8FD-F7A5-4C70-AE1E-2255FCAB1154", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.46:*:*:*:*:*:*:*", "matchCriteriaId": "58387159-A167-4032-9F3F-B517EF2185F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.47:*:*:*:*:*:*:*", "matchCriteriaId": "CB414CE9-5EFA-45F7-BB0B-B8B3893444DE", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.48:*:*:*:*:*:*:*", "matchCriteriaId": "93FBE9FB-99AC-4800-BB1F-4F0689E0A07A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:1.49:*:*:*:*:*:*:*", "matchCriteriaId": "EFB83944-0183-4DDB-B20E-0C8A7646A07F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "80151ACD-28DC-4383-9B7E-F2B759299341", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "1C15294D-F2AC-4E81-A612-14A31510449D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF2EE2D3-A942-4CAE-8F14-213BB6CBD62A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "05630C5E-263A-4974-81A0-2DC178B9708C", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "4B372AF6-29BB-4DAA-B3DA-3F8AE7BBC5BF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "C17CD4D0-DFE5-4C01-BEEA-891C865E18AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6EEB7512-D7E2-4F24-B96F-4FFE9E650262", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "307F457C-4015-4857-ADB8-637BC53DEB54", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "B645F9A1-44FB-4504-BF6C-2810EE841025", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.4.0:*:*:*:*:*:*:*", "matchCriteriaId": "E91B29C4-3709-473E-8F69-69D77ECEB221", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "FB3068F9-9A65-4DC4-88C2-19C8E1807CED", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "ADDA896A-8EA8-4924-A648-6001F83F8AB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.6.0:*:*:*:*:*:*:*", "matchCriteriaId": "91611ED9-FFDE-42B2-8E02-5B089A34DB33", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "638055BA-CB01-404E-B9CD-D9EEB284ACE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.6.2:*:*:*:*:*:*:*", "matchCriteriaId": "54F33281-2EA9-49EF-A074-E0AE93D4DC72", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "2EA4A6E5-F1A0-42E8-BB49-E06497DA582B", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "085763C4-D71A-47AF-B64C-829E6EC8E6D1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.6.5:*:*:*:*:*:*:*", "matchCriteriaId": "9805F52C-B9F4-4531-A478-C3FA03D1EA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.6.6:*:*:*:*:*:*:*", "matchCriteriaId": "1183DBED-4EF7-4942-9400-D57BC0C63773", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.7.0:*:*:*:*:*:*:*", "matchCriteriaId": "4FCE3D75-98D9-4D95-9EB9-F33E37CC047B", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.7.1:*:*:*:*:*:*:*", "matchCriteriaId": "58228B5F-7FA1-42B5-BC4A-A5F6535E2C39", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.7.2:*:*:*:*:*:*:*", "matchCriteriaId": "C7D4C885-1FDB-479C-9626-B006E1C84E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.0:*:*:*:*:*:*:*", "matchCriteriaId": "6574874E-EE2A-43B0-9D4B-9106C46BF8AF", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.1:*:*:*:*:*:*:*", "matchCriteriaId": "62A4C415-6408-4A7E-A1C9-8A327B0DEA59", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.2:*:*:*:*:*:*:*", "matchCriteriaId": "7B35E250-F525-4EF5-9DBD-D80D68E5C00E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.3:*:*:*:*:*:*:*", "matchCriteriaId": "79388C94-3306-4FD2-880E-56D42830B822", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.4:*:*:*:*:*:*:*", "matchCriteriaId": "E181D243-AFF0-41E3-A969-3DC67E81E8A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.5:*:*:*:*:*:*:*", "matchCriteriaId": "D445C68D-BFB8-4BAB-B995-FADF7CA5DF2B", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.6:*:*:*:*:*:*:*", "matchCriteriaId": "D8982A13-3F5E-4B52-932C-00BD7CEA7625", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.7:*:*:*:*:*:*:*", "matchCriteriaId": "B0518BBC-BE6F-4949-A39B-1BE1FFA9442D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "9D5F66A1-E3C6-4D89-B3E3-AF46CC98BB00", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "8090363F-1850-4095-A212-0A554EA37A3C", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "26FA77D7-CE3B-4ED2-8117-E6CC1BA39B36", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "E4687A27-D41C-489D-AA95-E6999ABB696D", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.0:*:*:*:*:*:*:*", "matchCriteriaId": "C03AD0EA-BFB8-480D-9B9C-6D6BD0DABDB8", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "59BADDB6-D48A-4DC0-A758-902F0EBC51CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "D12770F8-8729-4712-9023-64CB2B374BCA", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.3:*:*:*:*:*:*:*", "matchCriteriaId": "4A7FD104-1DE9-4A2A-AB2B-CD4AD9E70A93", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.4:*:*:*:*:*:*:*", "matchCriteriaId": "A33D85D8-AA73-4120-9DB0-85B9E0BC14F1", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.5:*:*:*:*:*:*:*", "matchCriteriaId": "079B9B47-194A-4047-AFEB-ABAD9CA5E53E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.6:*:*:*:*:*:*:*", "matchCriteriaId": "98034760-4DF2-4D7B-92D8-02EDCF56E618", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.10.7:*:*:*:*:*:*:*", "matchCriteriaId": "7EB7B211-AFE1-4D1A-B46F-86394981D5D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "930C1B45-2ABE-42DD-8D10-B375ED796F4A", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "B5811AB6-ED08-40C9-A0CD-77793A495E81", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "82185F66-9E19-4C56-8E77-5C153275A542", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8E51FAC0-BEF4-4839-B3C0-CCC9ED015582", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "D902DF16-5F3A-485E-9409-BC47A4E46014", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "4A8FA7E4-B406-4587-86A7-F560FE64A3B9", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "77C35F36-AD3C-418C-ACED-486FF06EFFC0", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.7:*:*:*:*:*:*:*", "matchCriteriaId": "B28DF2CD-1BEC-4F5E-AD30-7F84E58DF223", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.11.8:*:*:*:*:*:*:*", "matchCriteriaId": "3960D793-C3C8-40FC-83B2-710ED2F5D658", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "5DDE4919-FA8A-485B-9F0E-BD015B1D4D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "CC022C7A-35DD-445D-B9D3-6024CF28610E", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.14.0:*:*:*:*:*:*:*", "matchCriteriaId": "88D408D9-B90D-495A-BC09-E322FBE78E06", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.14.1:*:*:*:*:*:*:*", "matchCriteriaId": "C9D00E45-E017-43AB-AAF9-9B4721CD8E0F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.15.0:*:*:*:*:*:*:*", "matchCriteriaId": "8DDB7238-FD06-4872-A736-9D988A0433E4", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.15.1:*:*:*:*:*:*:*", "matchCriteriaId": "676C7999-B586-40E0-83E8-EB09E3F107C6", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.16.0:*:*:*:*:*:*:*", "matchCriteriaId": "31B80A50-5766-4ED7-9254-5CDDB74C7C04", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.16.1:*:*:*:*:*:*:*", "matchCriteriaId": "DAF88AD1-AECE-4227-AE63-EA3E279238C0", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.17.0:*:*:*:*:*:*:*", "matchCriteriaId": "8ED441D3-6D17-4F8E-AF0E-27D813B2C68F", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.17.1:*:*:*:*:*:*:*", "matchCriteriaId": "22CAAB68-FD86-49DB-8DA7-F16FC3F6B878", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.17.2:*:*:*:*:*:*:*", "matchCriteriaId": "5DF19BA4-1BF5-4F1E-BE6C-318B581D1EB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:perl:perl:2.18.0:*:*:*:*:*:*:*", "matchCriteriaId": "D6EE9535-B8AB-4DC8-A012-405FDEF88CA3", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple format string vulnerabilities in dbdimp.c in DBD::Pg (aka DBD-Pg or libdbd-pg-perl) module before 2.19.0 for Perl allow remote PostgreSQL database servers to cause a denial of service (process crash) via format string specifiers in (1) a crafted database warning to the pg_warn function or (2) a crafted DBD statement to the dbd_st_prepare function." }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades de formato de cadena en dbdimp.c en el m\u00f3dulo DBD::Pg (tambi\u00e9n conocido como DBD-Pg o libdbd-pg-perl) anteriores a c2.19.0 en Perl, permite a servidores remotos de bases de datos a provocar una denegaci\u00f3n de servicio (ca\u00edda de proceso) a trav\u00e9s de unos especificadores de formato de cadena en (1) una advertencia de la base de datos sobre la funci\u00f3n pg_warn o (2) una declaraci\u00f3n DBD manipulada sobre la funci\u00f3n dbd_st_prepare." } ], "id": "CVE-2012-1151", "lastModified": "2024-11-21T01:36:32.673", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 5.0, "confidentialityImpact": "NONE", "integrityImpact": "NONE", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2012-09-09T21:55:05.213", "references": [ { "source": "secalert@redhat.com", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536" }, { "source": "secalert@redhat.com", "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes" }, { "source": "secalert@redhat.com", "url": "http://rhn.redhat.com/errata/RHSA-2012-1116.html" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48307" }, { "source": "secalert@redhat.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48319" }, { "source": "secalert@redhat.com", "url": "http://secunia.com/advisories/48824" }, { "source": "secalert@redhat.com", "url": "http://security.gentoo.org/glsa/glsa-201204-08.xml" }, { "source": "secalert@redhat.com", "url": "http://www.debian.org/security/2012/dsa-2431" }, { "source": "secalert@redhat.com", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:112" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6" }, { "source": "secalert@redhat.com", "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4" }, { "source": "secalert@redhat.com", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801733" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73854" }, { "source": "secalert@redhat.com", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73855" }, { "source": "secalert@redhat.com", "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=661536" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://cpansearch.perl.org/src/TURNSTEP/DBD-Pg-2.19.1/Changes" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://rhn.redhat.com/errata/RHSA-2012-1116.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/48319" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/48824" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://security.gentoo.org/glsa/glsa-201204-08.xml" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.debian.org/security/2012/dsa-2431" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2012:112" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/09/6" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.openwall.com/lists/oss-security/2012/03/10/4" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=801733" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73854" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/73855" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://rt.cpan.org/Public/Bug/Display.html?id=75642" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-134" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.